Does my business need Cyber Essentials?

Cyber Essentials helps keep businesses secure through the assessment of five controls: The use and proper configuration of firewalls The implementation of secure settings for devices and software The use of access control management The implementation of antimalware software and other methods The configuration of automatic updates for devices and software The certification is designed …

Find out about our new streamlined process for our Cyber Essentials Gold package!

We’ve streamlined our Cyber Essentials Gold process by eliminating the use of spreadsheets and implementing the helper feature on the IASME portal. This will ensure that your assessment remains consolidated in one location, eliminating the need for back-and-forth with spreadsheets. To facilitate this transition, we ask that you add helper@indelibledata.co.uk as a helper on the …

How should you handle uncertain end-of-life dates in Cyber Essentials?

While most manufacturers and developers are open about the support milestones of their products, some companies instead prefer to guard their end-of-life dates, which may result in awkward situations during Cyber Essentials certification. One example of this is Apple’s iOS operating system. Traditionally, Apple has supported the two latest major versions of iOS, whereas recently …

Artificial Intelligence is making life easier for cyber criminals

Indelible Data offers a range of packages for Cyber Essentials certification. Attackers are constantly adapting to new technologies so, as we go into 2024, it is important to be aware of new as well as existing cyber security threats that you could be targeted by, writes Cyber Security Technologist Tyson McGuirk. Artificial Intelligence has been …

Protect yourself this Christmas and look out for these phishing emails

Fraudsters work overtime during the Christmas period when they know we are more susceptible to scam emails and text messages, writes Office Supervisor Cheryl Smitham. We’ve put together some straightforward advice that could save your Christmas. If you receive an unexpected email, then ask yourself: Is the email addressed to you by name? Or is …

Discounted Cyber Essentials Certification for Charities

Indelible Data is offering Cyber Essentials at a discount to charities over the next two weeks, writes Business Administrator Abbey Wright. Charities purchasing Cyber Essentials between the 6th November and the 17th November will benefit from advice and guidance as well as a discounted price as part of a national effort to educate charities about …

Don’t leave it to the last minute to migrate to ISO 27001:2022!

ISO 27001 remains a vital asset for any organisation looking to demonstrate compliance while showing an organisation’s entrenched culture of security, writes Cyber Compliance Technician Aidan Collins. The internationally recognised standard for Information Security Management Systems (ISMS) offers robust protection against cyber threats with its controls, fostering a culture of security. With most organisations being …

Indelible Data teams clash in a messy Capture the Flag showdown!

Indelible Data have been back to paint balling again! This time with bigger teams and more bruises as Abbey Wright discovered. Team captains Jason McNicholas and Euan Henderson led their teams into battle where we took part in trying to capture the flag in three very thrilling terrains. Ultimately, Euan’s team did take the win …

When are user accounts actually admin accounts?

Under Cyber Essentials, there are various controls that are related to administrative accounts and their use, writes Cyber Security Technologist Tyson McGuirk. The scheme makes it very clear that user accounts and admin accounts should be separate and only used for their intended purpose. Admin accounts have access to additional permissions and services that would …

Hackers have developed Android APKs that can evade security software

Android Package Kit (APK) is the file format that the Android Operating Systems use to distribute and install apps, and therefore contains all the elements that an app needs to install correctly on your device, writes Cyber Security Technologist Euan Henderson. According to Zimperium, hackers are using APKs to bypass security measures using new compression …